TECHNICAL FIELD
[0001] The present disclosure relates to the field of information security, particularly
to a Short Message Service (SMS) reading method and device.
BACKGROUND
[0002] At present, a common authentication method is to perform safety verification by using
a verification code carried in an SMS.
[0003] In an Android operating system, a third party application may be authorized to read
an SMS. If the third party application is a malicious application, the third party
application may read a verification code in the SMS so as to acquire an authority
to execute a sensitive operation, such as an authority to execute a payment operation,
and an authority to execute registration and login and so on.
[0004] The embodiments of the present disclosure are presented to solve the problem that
a malicious application can read a verification code in an SMS to acquire an authority
to execute a sensitive operation due to the reason that a third party application
only having an SMS reading authority at the operating system level can read the content
of an SMS in an SMS component.
[0005] US2012/0291103A1 discloses methods, systems, and apparatus, including computer programs encoded on
a computer storage medium.
SUMMARY
[0006] Accordingly, the present invention provides a Short Message Service (SMS) reading
method and device, in accordance with claims which follow.
[0007] A method for reading an SMS is provided according to a first aspect of the embodiments
of the present disclosure. The method includes that:
a reading request of reading an SMS is received from a third party application;
when the SMS is an SMS carrying sensitive information, whether the third party application
belongs to an access authority list corresponding to the SMS is detected, wherein
an application in the access authority list has an authority to access the SMS; and
when the third party application belongs to the access authority list, the SMS is
fed back to the third party application.
[0008] In an embodiment, the step of receiving a reading request of reading an SMS from
a third party application may include that:
the reading request of reading the SMS is received from the third party application
through an operating system;
whether the third party application has an SMS reading authority is detected through
the operating system;
when the third party application has the SMS reading authority, the reading request
and an identifier of the third party application are forwarded to an SMS component
through the operating system; and
the reading request and the identifier of the third party application which are forwarded
by the operating system are received through the SMS component.
[0009] In an embodiment, the step of deleting whether the third party application belongs
to an access authority list corresponding to the SMS when the SMS is an SMS carrying
sensitive information may include that:
whether the SMS to be read according to the reading request is an SMS carrying sensitive
information is detected through the SMS component; and
when the SMS to be read according to the reading request is an SMS carrying sensitive
information, whether the third party application belongs to the access authority list
is detected according to the identifier.
[0010] In an alternative embodiment, the method may further include that:
whether the received SMS is an SMS carrying sensitive information is identified; and
when the SMS is an SMS carrying sensitive information, the access authority list corresponding
to the SMS is acquired.
[0011] In an embodiment, the step of acquiring the access authority list corresponding to
the SMS when the SMS is an SMS carrying sensitive information may include that:
a source party of the SMS is identified according to characteristic information of
the SMS, wherein the characteristic information includes at least one of a sender
number, an SMS content and an SMS template; and
an access authority list corresponding to the source party is acquired, wherein the
access authority list includes an application trusted by the source party.
[0012] In an embodiment, the step of identifying whether the received SMS is an SMS carrying
sensitive information may include that:
whether the SMS is an SMS carrying sensitive information is identified according to
characteristic information of the SMS, wherein the characteristic information includes
at least one of a sender number, an SMS content and an SMS template.
[0013] A device for reading an SMS is provided according to a second aspect of the embodiments
of the present disclosure. The device includes:
a request receiving module, configured to receive, from a third party application,
a reading request of reading an SMS;
an access detecting module configured to detect, when the SMS is an SMS carrying sensitive
information, whether the third party application belongs to an access authority list
corresponding to the SMS, wherein an application in the access authority list has
an authority to access the SMS; and
an information feedback module configured to, when the third party application belongs
to the access authority list, feed back the SMS to the third party application.
[0014] In an embodiment, the request receiving module may include:
a reading receiving sub-module, configured to receive the reading request of reading
the SMS from the third party application through an operating system;
a first authority sub-module configured to detect, through the operating system, whether
the third party application has an SMS reading authority;
a request forwarding sub-module configured to forward, when the third party application
has the SMS reading authority, the reading request and an identifier of the third
party application to an SMS component through the operating system; and an identifier
receiving sub-module configured to receive, through the SMS component, the reading
request and the identifier of the third party application which are forwarded by the
operating system.
[0015] In an embodiment, the access detecting module may include:
an information detecting sub-module configured to detect, through the SMS component,
whether the SMS to be read according to the reading request is an SMS carrying sensitive
information; and
a second authority sub-module configured to, when the SMS to be read according to
the reading request is an SMS carrying sensitive information, detect whether the third
party application belongs to the access authority list according to the identifier.
[0016] In an embodiment, the device may further include:
an SMS identifying module, configured to identify whether the received SMS is an SMS
carrying sensitive information; and
an authority acquiring module configured to acquire, when the SMS is an SMS carrying
sensitive information, the access authority list corresponding to the SMS.
[0017] In an embodiment, the authority acquiring module may include:
a source party identifying sub-module, configured to identify a source party of the
SMS according to characteristic information of the SMS, wherein the characteristic
information includes at least one of a sender number, an SMS content and an SMS template;
and
a list acquiring sub-module, configured to acquire an access authority list corresponding
to the source party, wherein the access authority list includes an application trusted
by the source party.
[0018] In an embodiment, the SMS identifying module may be further configured to identify,
according to characteristic information of the SMS, whether the SMS is an SMS carrying
sensitive information, wherein the characteristic information includes at least one
of a sender number, an SMS content and an SMS template.
[0019] A device for reading an SMS is provided according to a third aspect of the embodiments
of the present disclosure. The device includes:
a processor; and
a memory configured to store an instruction executable by the processor,
[0020] wherein the processor is configured to:
receive, from a third party application, a reading request of reading an SMS;
when the SMS is an SMS carrying sensitive information, detect whether the third party
application belongs to an access authority list corresponding to the SMS, wherein
an application in the access authority list has an authority to access the SMS; and
when the third party application belongs to the access authority list, feed back the
SMS to the third party application.
[0021] In one particular embodiment, the steps of the method for reading an SMS are determined
by computer program instructions.
[0022] Consequently, the invention is also directed to a computer program for executing
the steps of a method for reading an SMS as described above when this program is executed
by a computer.
[0023] This program can use any programming language and take the form of source code, object
code or a code intermediate between source code and object code, such as a partially
compiled form, or any other desirable form.
[0024] The invention is also directed to a computer-readable information medium containing
instructions of a computer program as described above.
[0025] The information medium can be any entity or device capable of storing the program.
For example, the support can include storage means such as a ROM, for example a CD
ROM or a microelectronic circuit ROM, or magnetic storage means, for example a diskette
(floppy disk) or a hard disk.
[0026] Alternatively, the information medium can be an integrated circuit in which the program
is incorporated, the circuit being adapted to execute the method in question or to
be used in its execution.
[0027] The technical solutions provided by the embodiments of the present disclosure may
include the following beneficial effects:
whether a received SMS is an SMS carrying sensitive information is identified;
when the SMS is an SMS carrying sensitive information, an access authority list corresponding
to the SMS is acquired, wherein an application in the access authority list has an
authority to access the SMS; a reading request to read the SMS is received from a
third party application, whether the third party application belongs to the access
authority list is detected, and when the third party application belongs to the access
authority list, the SMS is fed back to the third party application, thus solving the
problem that a malicious application can read a verification code in an SMS to acquire
an authority to execute a sensitive operation due to the reason that a third party
application only having an SMS reading authority at the operating system level may
read the content of an SMS in an SMS component; for an SMS carrying sensitive information,
only a third party application having an authority to access the SMS can read the
content in the SMS, thus avoiding leakage of the sensitive information in the SMS
while implementing authority control over a single SMS.
[0028] It is to be understood that both the foregoing general description and the following
detailed description are exemplary and explanatory only and are not restrictive of
the invention, as claimed.
BRIEF DESCRIPTION OF THE DRAWINGS
[0029] The accompanying drawings, which are incorporated in and constitute a part of this
specification, illustrate embodiments consistent with the invention and, together
with the description, serve to explain the principles of the invention.
Fig. 1 is a schematic diagram of components of a mobile terminal according to an exemplary
embodiment;
Fig. 2 is a flowchart of an SMS reading method according to an exemplary embodiment;
Fig. 3A is a flowchart of an SMS reading method according to another exemplary embodiment;
Fig. 3B is a flowchart of sub-steps of an SMS reading method according to still another
exemplary embodiment;
Fig. 4 is a flowchart of an SMS reading method according to yet another exemplary
embodiment;
Fig. 5 is a schematic diagram of an interface illustrating an SMS reading method according
to yet still another exemplary embodiment;
Fig. 6 is a block diagram of an SMS reading device according to an exemplary embodiment;
Fig. 7 is a block diagram of an SMS reading device according to another exemplary
embodiment; and
Fig. 8 is a block diagram of an SMS reading device according to an exemplary embodiment.
DETAILED DESCRIPTION
[0030] Reference will now be made in detail to exemplary embodiments, examples of which
are illustrated in the accompanying drawings. The following description refers to
the accompanying drawings in which the same numbers in different drawings represent
the same or similar elements unless otherwise represented. The implementations set
forth in the following description of exemplary embodiments do not represent all implementations
consistent with the invention. Instead, they are merely examples of apparatuses and
methods consistent with aspects related to the invention as recited in the appended
claims.
[0031] Several terms involved in the embodiments of the present disclosure will be introduced
briefly first.
[0032] Android operating system: a Linux-based operating system of free and open source
codes, which is produced by Google and mainly applied to a mobile terminal. The mobile
terminal may be a mobile phone, a tablet computer, an electronic book reader, a Moving
Picture Experts Group Audio Layer III (MP3) player, a Moving Picture Experts Group
Audio Layer IV (MP4) player, a portable laptop computer and so on.
[0033] Application: an application generally includes at least one program component in
an Android operating system. There are four program components, an activity component,
a service component, a content provider component and a broadcast receiver component.
[0034] Activity component: which is a component responsible for interacting with a user
in an android application and providing a visible user interface for the Android application.
One Android application may include more than one activity component.
[0035] Service component: which is a component operating in the background and not providing
a user interface in an Android application. One Android application may include more
than one service component.
[0036] Content provider component: which is a component configured to provide data, such
as an SMS, a tone, a piece of wallpaper, contacts and so on, for other applications
or for other components in a current application in an Android application. The content
provider component may encapsulate data in various formats and provide the data to
other applications or components in a standard form, wherein an SMS component in the
embodiments of the present disclosure is a content provider component.
[0037] Broadcast receiver component: which is configured to receive and respond to a message
which is broadcast by an operating system. The broadcast receiver component can receive
a message of interest (or a message of a predefined message type) and then process
and forward the message to other components in a current application.
[0038] Third party application: which is an application other than preinstalled applications
of an operating system in a mobile terminal.
[0039] To facilitate understanding, please refer to Fig. 1 first, which shows a schematic
diagram of components of a mobile terminal according to an exemplary embodiment. The
mobile terminal includes an SMS component 120, an operating system 140 and a third
party application 160. The operating system 140 receives a reading request from the
third party application 160, and forwards the reading request to the SMS component
120.
[0040] The mobile terminal may be a mobile phone, a tablet computer, an electronic book
reader, an MP3 player, an MP4 player, a portable laptop computer and so on.
[0041] The SMS component 120 is a content provider component in an Android application and
is configured to provide SMS data for other applications or other components in a
current application. The SMS component 120 may receive SMSs from a source party, and
store the received SMSs to form an SMS list.
[0042] The operating system 140 pre-stores a configuration file, and the configuration file
stores an SMS reading authority of the third party application 160 at the operating
system level.
[0043] Alternatively, the operating system 140 stores a general configuration file. The
general configuration file stores SMS reading authorities of all third party applications
160 at the operating system level.
[0044] Alternatively, the operating system 140 stores a plurality of configuration files,
and the SMS reading authority of each third party application 160 at the operating
system level respectively corresponds to a configuration file.
[0045] The third party application 160, when having the SMS reading authority at the operating
system level, can read all SMSs in the SMS component 120, and the third party application
160 without the SMS reading authority at the operating system level cannot read any
SMS in the SMS component 120.
[0046] The third party component 160 may include one or more program components, each of
which may be any one of the following: an activity component 162, a service component
164, a content provider component 166 and a broadcast receiver component 168.
[0047] When the third party application 160 needs to read an SMS in the short message component
120, the third party application 160 sends a reading request of reading the SMS to
the operating system 140 first. After receiving the reading request, the operating
system 140 detects whether the third party application 160 is in an SMS reading authority
list, and when the third party application 160 is in the SMS reading authority list,
the operating system 140 forwards to the SMS component 120 the SMS reading request
sent by the third party application 160. After receiving the reading request forwarded
by the operating system 140, the SMS component 120 searches the SMS list, according
to the SMS that needs to be read according to the reading request, for the SMS that
needs to be read, and feeds back the found SMS to the third party application 160
through the operating system 140.
[0048] Fig. 2 is a flowchart of an SMS reading method according to an exemplary embodiment.
The present embodiment illustrates the SMS reading method applied in the mobile terminal
as shown in Fig. 1 as an example. The SMS reading method includes several steps as
follows.
[0049] Step 201: A reading request of reading an SMS is received from a third party application.
[0050] The third party application is an application in a configuration file of the operating
system, and the configuration file is a file for performing authority control according
to an application granularity.
[0051] Step 202: When the SMS is an SMS carrying sensitive information, whether the third
party application belongs to an access authority list corresponding to the SMS is
detected, wherein an application in the access authority list has an authority to
access the SMS.
[0052] The access authority list is an authority list in the SMS component, and is a list
for performing authority control according to a single SMS granularity.
[0053] Step 203: When the third party application belongs to the access authority list,
the SMS is fed back to the third party application.
[0054] To sum up, in an SMS reading method provided in an embodiment of the present disclosure,
a reading request of reading an SMS is received from a third party application; when
the SMS is an SMS carrying sensitive information, whether the third party application
belongs to an access authority list corresponding to the SMS is detected, wherein
an application in the access authority list has an authority to access the SMS; and
when the third party application belongs to the access authority list, the SMS is
fed back to the third party application, thus solving the problem that a malicious
application can read a verification code in an SMS to acquire an authority to execute
a sensitive operation due to the reason that a third party application only having
an SMS reading authority at the operating system level may read all SMSs in an SMS
component; for an SMS carrying sensitive information, only a third party application
having an access authority to the SMS can read the SMS content in the SMS, and otherwise,
the sensitive information in the SMS cannot be read, thus avoiding leakage of the
sensitive information in the SMS while implementing authority control over a single
SMS granularity.
[0055] Fig. 3A is a flowchart of an SMS reading method according to another exemplary embodiment.
The present embodiment illustrates the SMS reading method applied in the mobile terminal
in the implementation environment as shown in Fig. 1 as an example. The SMS reading
method includes several steps as follows.
[0056] Step 301: Whether a received SMS is an SMS carrying sensitive information is identified.
[0057] The sensitive information is information related to virtual properties and/or a control
authority of a user in a network.
[0058] The SMS component receives an SMS from the source party of the SMS and identifies
the received SMS so as to identify whether the SMS carries sensitive information.
[0059] The step that the SMS component identifies the SMS may include that the SMS component
identifies, according to characteristic information of the SMS, whether the SMS is
an SMS carrying sensitive information, wherein the characteristic information includes
at least one of followings: a sender number, an SMS content and an SMS template.
[0060] Step 302: When the SMS is not an SMS carrying sensitive information, the SMS is stored
directly.
[0061] When the SMS is not an SMS carrying sensitive information, the SMS component stores
the SMS directly.
[0062] Step 303: When the SMS is an SMS carrying sensitive information, an access authority
list corresponding to the SMS is acquired, wherein an application in the access authority
list has an authority to access the SMS.
[0063] When an identifying result indicates that the SMS is an SMS carrying sensitive information,
the SMS component acquires, according to a source party of the SMS, an access authority
list corresponding to the SMS, and an application in the access authority list has
an authority to access the SMS.
[0064] Alternatively, the mobile terminal pre-stores source parties and corresponding access
authority lists thereof. Alternatively, the mobile terminal regularly acquires, from
a server, access authority lists corresponding to the source parties and updates old
ones with them.
[0065] In the present embodiment, Step 303 may include the following sub-steps, as shown
in Fig. 3B.
[0066] Step 303a: A source party of the SMS is identified according to characteristic information
of the SMS, wherein the characteristic information includes at least one of a sender
number, an SMS content and an SMS template.
[0067] After identifying that the SMS is an SMS carrying sensitive information, the SMS
component identifies a source party of the SMS according to characteristic information
of the SMS, wherein the characteristic information includes at least one of a sender
number, an SMS content and an SMS template.
[0068] Alternatively, the SMS component may acquire the source party of the SMS according
to a sender number of the SMS. For example, a sender number is 95588, and the SMS
component acquires, according to 95588 that the SMS is an SMS from Industrial and
Commercial Bank of China, and the source party of the SMS is "Industrial and Commercial
Bank of China".
[0069] Alternatively, the SMS component may acquire the source party of the SMS according
to an SMS content of the SMS. For example, when the SMS content of the SMS carries
a content that "you are paying using Xiaomi Payment, and your payment password is
100582", the SMS component may acquire, according to keywords "Xiaomi Payment", that
the source party of the SMS is "Xiaomi Company".
[0070] Alternatively, the SMS component may further acquire the source party of the SMS
according to an SMS template. The SMS component pre-stores a plurality of SMS templates
carrying sensitive information, and stores source parties corresponding to the SMS
templates. For example, an SMS template is "You are paying through Xiaomi Company,
and the payment amount is xxxxx", then the SMS component stores the SMS template,
and information indicating that the source party is "Xiaomi Company" will be stored
in a corresponding location of the SMS template. After identifying the SMS, the SMS
component matches the SMS whch is identified to carry the sensitive information with
the stored SMS template, thereby acquiring a corresponding source party of the SMS.
[0071] Step 303b: An access authority list corresponding to the source party is acquired,
wherein the access authority list includes an application trusted by the source party.
After acquiring the source party of the SMS, the SMS component acquires, according
to the source party of the SMS, an access authority list corresponding to the source
party. The access authority list includes an application trusted by the source party.
[0072] Exemplarily, applications trusted by the source party "Xiaomi Company" are as shown
in the following Table 1.
Table 1
Source party |
Access authority list |
|
|
Xiaomi Company |
Xiaomi Payment |
Xiaomi Cinema |
Xiaomi Application Store |
Xiomi Mall |
[0073] It may be learned from Table 1 that an access authority list corresponding to the
source party "Xiaomi Company" includes 4 trusted applications, which are Xiaomi Payment,
Xiaomi Cinema, Xiaomi Application Store and Xiomi Mall.
[0074] The SMS component marks the SMS as an SMS carrying sensitive information, and associates
and stores a corresponding access authority list.
[0075] Step 304: The operating system receives from the third party application a reading
request of reading the SMS.
[0076] When the third party application needs to read an SMS in the SMS component, the third
party application sends a reading request to read the SMS to the operating system
first. Accordingly, the operating system receives the reading request to read the
SMS from the third party application.
[0077] Here the third party application may be an SMS-class application, a payment-class
application, a registration-class application, and so on, and the type of the third
party application is not defined in the embodiments of the present disclosure.
[0078] Step 305: The operating system detects whether the third party application has an
SMS reading authority.
[0079] The operating system pre-stores SMS reading authorities of third party applications,
and when receiving a reading request to read an SMS from a certain third party application,
the operating system acquires a pre-stored configuration file first, and detects whether
the third party application is in the pre-stored configuration file. If the third
party application is in the pre-stored configuration file, the third party application
has an SMS reading authority. Otherwise, the third party application does not have
the SMS reading authority.
[0080] Step 306: When the third party application does not have the SMS reading authority,
the operating system does not forward the reading request and an identifier of the
third party application to the SMS component.
[0081] Step 307: When the third party application has the SMS reading authority, the operating
system forwards the reading request and an identifier of the third party application
to the SMS component.
[0082] When it is detected by the operating system that the third party application has
the SMS reading authority at the operating system level, the operating system acquires,
from the reading request sent by the third party application, the identifier of the
third party application, and forwards, to the operating system, the reading request
of the third party application and the acquired identifier of the third party application.
Information forwarded by the operating system to the SMS component includes two contents,
which are the SMS reading request sent by the third party application and the identifier
of the third party application.
[0083] Alternatively, the operating system adds the identifier of the third party application
to the reading request, and forwards, to the SMS component, the reading request carrying
the identifier of the third party application.
[0084] Step 308: The SMS component receives the reading request and the identifier of the
third party application which are forwarded by the operating system. Alternatively,
the SMS component receives the reading request which is forwarded by the operating
system and carries the identifier of the third party application.
[0085] For example, if a third party application "Xiaomi Mall"sends to the operating system
an SMS ofreading an payment password in "Xiaomi Payment" in the SMS component, then
after receiving the reading request, the operating system detects whether "Xiaomi
Mall" has an SMS reading authority in the operating system, and when "Xiaomi Mall"
has an SMS reading authority, forwards the reading request sent by "Xiaomi Mall" and
an identifier of "Xiaomi Mall" to the SMS component. The SMS component receives the
reading request and the identifier of "Xiaomi Mall" which are forwarded by the operating
system.
[0086] Step 309: The SMS component detects whether the SMS required to be read according
to the reading request is an SMS carrying sensitive information.
[0087] The SMS component acquires, according to the received reading request, the SMS required
to be read in the reading request and detects whether the SMS required to be read
in the reading request carries a marker. When a marker is carried, the SMS is an SMS
carrying sensitive information, and otherwise, the SMS is not an SMS carrying sensitive
information.
[0088] Step 310: When the SMS required to be read in the reading request is not an SMS carrying
sensitive information, the SMS component feeds back the SMS to the third party application.
[0089] Step 311: When the SMS required to be read in the reading request is an SMS carrying
sensitive information, the SMS component detects, according to the identifier, whether
the third party application belongs to an access authority list. When the SMS required
to be read in the reading request is an SMS carrying sensitive information, the SMS
component acquires an access authority list of SMSs carrying sensitive information,
and detects whether the identifier of the third party application is in the access
authority list. An application in the access authority list has an authority of accessing
the SMS.
[0090] Step 312: When the third party application belongs to the access authority list,
the SMS is fed back to the third party application.
[0091] When it is detected by the SMS component that the identifier of the third party application
is in the access authority list, the SMS component feeds back the SMS carrying the
sensitive information to the corresponding third party application.
[0092] Step 313: When the third party application does not belong to the access authority
list, the SMS is not fed back to the third party application.
[0093] It needs to be noted that: Step 301 to Step 303 and Step 304 to Step 308 in the present
embodiment are not limited to specific sequences in the present embodiment. In other
words, the step that the SMS component identifies whether the SMS is an SMS carrying
sensitive information may be performed after the step that the reading request ofwarded
by the operating system is received, and whether the SMS is an SMS carrying sensitive
information may be pre-identified before the reading request ofwarded by the operating
system is received.
[0094] To sum up, in the SMS reading method provided in the embodiment of the present disclosure,
a reading request of reading an SMS is received from a third party application; when
the SMS is an SMS carrying sensitive information, whether the third party application
belongs to an access authority list corresponding to the SMS is detected, wherein
an application in the access authority list has an authority to access the SMS; and
when the third party application belongs to the access authority list, the SMS is
fed back to the third party application, thus solving the problem that a malicious
application can read a verification code in an SMS to acquire an authority to execute
a sensitive operation due to the reason that a third party application only having
an SMS reading authority at the operating system level may read all SMSs in an SMS
component, and for an SMS carrying sensitive information, only a third party application
having an authority to access to the SMS can read an SMS content in the SMS, and otherwise,
the sensitive information in the SMS cannot be read, thus avoiding leakage of the
sensitive information in the SMS while implementing authority control over a single
SMS granularity.
[0095] The reading request and an identifier of the third party application are forwarded
by an operating system to an SMS component, so that the SMS component detects, according
to the identifier of the third party application, whether the third party application
has an SMS access authority, and the third party application needs to have access
authorities of two levels to read the sensitive information.
[0096] An access authority list using a single SMS as a granularity is added only to the
SMS component, thus implementing authority control over a single SMS granularity,
and achieving the effect of simple and convenient operation and easy implementation.
[0097] In the embodiment of Fig. 3A, the SMS component identifies whether the SMS is an
SMS carrying sensitive information according to several methods as follows in Step
301.
[0098] Alternatively, the SMS component may identify, according to a sender number of the
received SMS, whether the SMS carries sensitive information. Generally, a list is
stored in an SMS background server. For example, the list stores company A and SMS
number 1 and SMS number 2 which are SMS numbers corresponding to company A, company
B and SMS number 3 and SMS number 4 which are SMS numbers corresponding to company
B, company C and SMS number 5 and SMS number 6 which are SMS numbers corresponding
to company C, and so on. Exemplarily, the list stored in the SMS background server
is as shown in the following Table 2.
Table 2
Company name |
SMS number |
Company A |
SMS number 1 |
SMS number 2 |
Company B |
SMS number 3 |
SMS number 4 |
Company C |
SMS number 5 |
SMS number 6 |
[0099] When the sender number of the SMS received by the SMS component is SMS number 5,
it can be learned from the corresponding relations in Table 2 that the source party
of the SMS is company C, and the SMS component identifies the SMS as an SMS carrying
sensitive information.
[0100] Alternatively, the SMS component may identify, according to an SMS content of the
received SMS, whether the SMS carries sensitive information. For example, the SMS
content is "[Asan Travel • Go] 06-22 07:15 Kunming Changshui Airport--take-off-08:55
and Chongqing Jiangbei Airport 2B landing Lucky Airlines 8L9863, Order XXXXXXXXXXX,
paying, Zhang Wuji (Ticket number: XXX-XXXXXXXXXX). Click on http://tb.cn/3eXI06y,
and check details of the flight on the client", then the SMS component identifies,
according to keywords [Asan Travel • Go] in the SMS content, that the SMS is an SMS
carrying sensitive information.
[0101] Alternatively, the SMS component may also identify, according to an SMS template,
whether the SMS carries sensitive information. For example, the SMS component pre-stores
a plurality of SMS templates carrying sensitive information. When the SMS is received,
the SMS component matches the received SMS with a stored SMS template. When the received
SMS is matched with a certain SMS template, the SMS is identified as an SMS carrying
sensitive information.
[0102] For example, SMS 1: sender: 140000621 "[Company A] order number XXXXXXXXXXX paying,
the verification code is XXXXXX. Click on http://tb.cn/3eXI06y, and check details
on the client."
[0103] SMS 2: sender: 140000622 "[Company A] order number XXXXXXXXXXX paying, the verification
code is XXXXXX. Click on http://tb.cn/3eXI06y, and check details on the client."
[0104] SMS 1 and SMS 2 are SMSs sent by Jingdong Company, the source party identifier of
SMS 1 is "140000621", the source party identifier of SMS 2 is "140000622" and the
two source parties have the same prefix "1400062". In the meanwhile, the two SMSs
contain a keyword "[Company A]".
[0105] Exemplarily, two SMS templates constructed by SMS 1 and SMS 2 are as follows.
[0106] <payment template 1> □ "[Company A]<Order number> <Verification code>."
<Payment template 2> □ "[Company A]< Order number > < Verification code>." Exemplarily,
corresponding relations between extracted templates and combinations of keywords and
identification characteristics of the senders of the SMSs are as shown in the following
Table 3.
Table 3
SMS characteristic |
SMS template |
14000062X+[Company A] |
<payment template 1> |
14000062X+[Company A] |
<payment template 2> |
[0107] When the SMS received by the SMS component carries a characteristic of "14000062X+[Company
A]", the SMS will be matched with <payment template 2> in the SMS templates. Therefore,
the SMS component identifies the SMS as an SMS carrying sensitive information.
[0108] For example, after a product is purchased in Xiaomi Mall, an order is submitted by
clicking, acquisition of a verification code from a mobile phone is selected during
payment, and a mobile phone bound with the website of Xiaomi Mall will receive a SMS
containing a verification code from Xiaomi Company within 60 seconds. Provided that
the received SMS is: Sender: 160000621 "[Xiaomi Company]Order number XXXXXXXXXXX,
paying, the verification code is XXXXXX. Click on http://tb.cn/3eXI06y, and check
details on the client." Then the whole SMS reading process is as shown in Fig. 4.
[0109] Step 401: The SMS component receives an SMS sent by a source party.
[0110] Step 402: The SMS component identifies, according to a sender of the received SMS,
that SMS is an SMS carrying sensitive information.
[0111] The SMS identifies, according to a sender 160000621 of the SMS, that the SMS carries
information of a verification code. In other words, the SMS is an SMS carrying sensitive
information.
[0112] Step 403: The SMS component acquires an access authority list corresponding to the
SMS, wherein an application in the access authority list has an authority to access
the SMS.
[0113] The SMS component acquires, according to "[Xiaomi Company] Order number XXXXXXXXXXX
paying, the verification code is XXXXXX. Click on http://tb.cn/3eXI06y, and check
details on the client." in the SMS, that the source party of the SMS is "Xiaomi Company"
and acquires an access authority list corresponding to Xiaomi Company.
[0114] Step 404: A third party application "Xiaomi Mall" sends a reading request to the
operating system.
[0115] Accordingly, the operating system receives the reading request to read an SMS from
the third party application "Xiaomi Mall".
[0116] Step 405: The operating system detects that the third party application "Xiaomi Mall"
has an authority to read the SMS.
[0117] Step 406: The operating system forwards the reading request sent by the third party
application and an identifier "Xiaomi Mall" of the third party application to the
SMS component.
[0118] Step 407: The SMS component detects that the SMS required to be read according to
the reading request is an SMS carrying sensitive information.
[0119] Step 408: The SMS component detects, according to the identifier of the third party
application, that the third party application "Xiaomi Mall" belongs to an access authority
list.
[0120] Step 409: The SMS component feeds back the SMS to the third party application "Xiaomi
Mall".
[0121] Step 410: A third party application "Company A" sends a reading request to the operating
system.
[0122] Accordingly, the operating system receives the reading request to read an SMS from
the third party application "Company A".
[0123] Step 410: The operating system detects that the third party application "Company
A" has an authority of reading the SMS.
[0124] Step 411: The operating system sends the reading request of the third party application
and an identifier "Company A" of the third party application to the SMS component.
[0125] Step 412: The SMS component detects that the SMS required to be read according to
the reading request is an SMS carrying sensitive information.
[0126] Step 413: The SMS component detects, according to the identifier of the third party
application, that the third party application "Company A" does not belong to an access
authority list.
[0127] Step 414: The SMS component does not feed back the SMS to the third party application
"Company A".
[0128] The schematic diagram of an interface illustrating a successful SMS reading process,
which is shown in Fig. 4, is as shown in Fig. 5.
[0129] The following description refers to device embodiments of the present disclosure,
which may be configured to execute the method embodiments of the present disclosure.
Please refer to the method embodiments of the present disclosure for details not disclosed
in the device embodiments of the present disclosure.
[0130] Fig. 6 is a block diagram of an SMS reading device according to an exemplary embodiment.
The SMS reading device may be implemented as a mobile terminal or a part of the mobile
terminal with a combination of software and hardware. The SMS reading device includes,
but is not limited to:
a request receiving module 620, configured to receive, from a third party application,
a reading request to read an SMS;
an access detecting module 640 configured to detect, when the SMS is an SMS carrying
sensitive information, whether the third party application belongs to an access authority
list corresponding to the SMS, wherein an application in the access authority list
has an authority otof access the SMS; and
an information feedback module 660 configured to, when the third party application
belongs to the access authority list, feed back the SMS to the third party application.
[0131] To sum up, in the SMS reading device provided in the embodiment of the present disclosure,
a reading request to read an SMS is received from a third party application; when
the SMS is an SMS carrying sensitive information, whether the third party application
belongs to an access authority list corresponding to the SMS is detected, wherein
an application in the access authority list has an authority to access the SMS; and
when the third party application belongs to the access authority list, the SMS is
fed back to the third party application, thus solving the problem that a malicious
application can read a verification code in an SMS to acquire an authority to execute
a sensitive operation due to the reason that a third party application only having
an SMS reading authority at the operating system level may read all SMSs in an SMS
component, and for an SMS carrying sensitive information, only a third party application
having an authority to access the SMS can read the SMS content in the SMS, and otherwise,
the sensitive information in the SMS cannot be read, thus avoiding leakage of the
sensitive information in the SMS while implementing authority control over a single
SMS granularity.
[0132] Fig. 7 is a block diagram of an SMS reading device according to another exemplary
embodiment. The SMS reading device may be implemented as a mobile terminal or a part
of the mobile terminal by a combination of software and hardware. The SMS reading
device includes, but is not limited to:
an SMS identifying module 710, configured to identify whether a received SMS is an
SMS carrying sensitive information;
the SMS identifying module 710 may be further configured to identify, according to
characteristic information of the SMS, whether the SMS is an SMS carrying sensitive
information, wherein the characteristic information includes at least one of a sender
number, an SMS content and an SMS template;
an authority acquiring module 720 configured to acquire, when the SMS is an SMS carrying
sensitive information, an access authority list corresponding to the SMS, wherein
an application in the access authority list has an authority to access the SMS.
[0133] The authority acquiring module 720 may include:
a source party identifying sub-module 721, configured to identify a source party of
the SMS according to characteristic information of the SMS, wherein the characteristic
information includes at least one of a sender number, an SMS content and an SMS template;
and
a list acquiring sub-module 722, configured to acquire an access authority list corresponding
to the source party, wherein the access authority list includes an application trusted
by the source party; and
a request receiving module 730, configured to receive, from a third party application,
a reading request to read an SMS.
[0134] The request receiving module 730 may include:
a reading receiving sub-module 731, configured to receive the reading request to read
the SMS from the third party application through an operating system;
a first authority sub-module 732 configured to detect, through the operating system,
whether the third party application has an SMS reading authority;
a request forwarding sub-module 733 configured to forward, when the third party application
has the SMS reading authority, the reading request and an identifier of the third
party application to an SMS component through the operating system;
an identifier receiving sub-module 734 configured to receive, through the SMS component,
the reading request and the identifier of the third party application which are forwarded
by the operating system; and
an access detecting module 740, configured to detect, when the SMS is an SMS carrying
sensitive information, whether the third party application belongs to an access authority
list corresponding to the SMS, wherein an application in the access authority list
has an authority to access the SMS.
[0135] The access detecting module 740 may include:
an information detecting sub-module 741 configured to detect, through the SMS component,
whether the SMS to be read according to the reading request is an SMS carrying sensitive
information;
a second authority sub-module 742 configured to, when the SMS to be read according
to the reading request is an SMS carrying sensitive information, detect whether the
third party application belongs to the access authority list according to the identifier;
and
an information feedback module 750 configured to, when the third party application
belongs to the access authority list, feed back the SMS to the third party application.
[0136] To sum up, in the SMS reading device provided in the embodiment of the present disclosure,
a reading request to read an SMS is received from a third party application; when
the SMS is an SMS carrying sensitive information, whether the third party application
belongs to an access authority list corresponding to the SMS is detected, wherein
an application in the access authority list has an authority to access the SMS; and
when the third party application belongs to the access authority list, the SMS is
fed back to the third party application, thus solving the problem that a malicious
application can read a verification code in an SMS to acquire an authority to execute
a sensitive operation due to the reason that a third party application only having
an SMS reading authority at the operating system level may read all SMSs in an SMS
component, and for an SMS carrying sensitive information, only a third party application
having an access authority to the SMS can read the SMS content in the SMS, and otherwise,
the sensitive information in the SMS cannot be read, thus avoiding leakage of the
sensitive information in the SMS while implementing authority control over a single
SMS granularity.
[0137] The reading request and an identifier of the third party application are forwarded
by an operating system to an SMS component, so that the SMS component detects, according
to the identifier of the third party application, whether the third party application
has an SMS access authority, and the third party application needs to have access
authorities of two levels to read the sensitive information.
[0138] An access authority list using a single SMS as a granularity is added only to the
SMS component, thus implementing authority control over a single SMS granularity,
and enabling simple and convenient operation and easy implementation.
[0139] Specific methods for modules in the devices in the embodiments above to execute operations
have been expounded in the embodiments related to the method, and will not be elaborated
and described in detail herein.
[0140] An embodiment of the present disclosure further provides an SMS reading device. The
device may be configured to implement an SMS reading method provided by an embodiment
of the present disclosure. The device includes a processor, and a memory configured
to store an instruction executable by the processor;
wherein the processor is configured to:
receive, from a third party application, a reading request of reading an SMS;
when the SMS is an SMS carrying sensitive information, detect whether the third party
application belongs to an access authority list corresponding to the SMS,
wherein an application in the access authority list has an authority to access the
SMS; and
when the third party application belongs to the access authority list, feed back the
SMS to the third party application.
[0141] Fig. 8 is a block diagram of an SMS reading device according to an exemplary embodiment.
For example, the device 800 may be a mobile phone, a computer, a digital broadcasting
terminal, a message transceiver, a game console, a tablet device, a medical device,
a fitness device, a personal digital assistant and so on. Referring to Fig. 8, the
device 800 may include one or more of the following components: a processing component
802, a memory 804, a power component 806, a multimedia component 808, an audio component
810, an Input/Output (I/O) interface 812, a sensor component 814 and a communication
component 816. Generally, the processing component 802 controls overall operations
of the device 800, such as operations associated with display, a telephone call, data
communication, a camera operation and a recording operation. The processing component
802 may include one or more processors 818 to execute instructions so as to perform
all or part of the steps of the method. Besides, the processing component 802 may
include one or more modules, so as to process interaction between the processing component
802 and other components. For example, the processing component 802 may include a
multimedia module so as to facilitate interaction between the multimedia component
808 and the processing component 802.
[0142] The memory 804 is configured to store various types of data so as to support operations
in the device 800. Examples of such data include instructions for any applications
or methods operated on the device 800, contact data, phonebook data, messages, pictures,
video, etc. The memory 804 may be implemented using any type of volatile or non-volatile
memory devices or a combination thereof, such as a Static Random-Access Memory (SRAM),
an Electrically Erasable Programmable Read-Only Memory (EEPROM), an Erasable Programmable
Read-Only Memory (EPROM), a Programmable Read-Only Memory (PROM), a Read-Only Memory
(ROM), a magnetic memory, a flash memory, a magnetic disk or an optical disk. The
power component 806 provides power to various components of the device 800. The power
component 806 may include a power management system, one or more power sources, and
other components associated with power generation, management and distribution of
the device 800.
[0143] The multimedia component 808 includes a screen providing an output interface between
the device 800 and a user. In some embodiments, the screen may include a Liquid Crystal
Display (LCD) and a Touch Panel (TP). When the screen includes the TP, the screen
may be implemented as a touch screen to receive an input signal from the user. The
TP includes one or more touch sensors so as to sense a touch, a slide and a gesture
on the TP. The touch sensor may not only sense a touch or a boundary of a slide, but
also detect a duration and a pressure related to the touch or the slide. In some embodiments,
the multimedia component 808 includes a front camera and/or a rear camera. When the
device 800 is in an operation mode, such as a camera mode or a video mode, the front
camera and/or the rear camera may receive external multimedia data. Each of the front
camera and the rear camera may be a fixed optical lens system or have focus and optical
zoom capability.
[0144] The audio component 810 is configured to output and/or input an audio signal. For
example, the audio component 810 includes a Microphone (MIC). When the device 800
is in an operation mode, such as a calling mode, a recording mode and a voice recognition
mode, the MIC is configured to receive an external audio signal. The received audio
signal may be further stored in the memory 804 or sent by the communication component
816. In some embodiments, the audio component 810 further includes a loudspeaker,
configured to output the audio signal.
[0145] The I/O interface 812 provides an interface between the processing component 802
and peripheral interface modules, such as a keyboard, a click wheel, buttons and so
on. The buttons may include, but are not limited to a home button, a volume button,
a starting button and a locking button.
[0146] The sensor component 814 includes one or more sensors configured to provide status
assessments of various aspects of the device 800. For example, the sensor component
814 may detect an open/closed state of the device 800, and the relative locations
of the components. For example, the components are the display and the keypad of the
device 800. The sensor component 814 may further detect a change in position of the
device 800 or a component of the device 800, a presence of contact between the user
and the device 800, an orientation or an acceleration/deceleration of the device 800
and a change in the temperature of the device 800. The sensor component 814 may include
a proximity sensor, configured to detect the presence of a nearby object without any
physical contact. The sensor component 814 may further include an optical sensor,
such as a Complementary Metal Oxide Semiconductor (CMOS) or Charge Coupled Device
(CCD) image sensor used in an imaging application. In some embodiments, the sensor
component 814 may further include an acceleration sensor, a gyro sensor, a magnetic
sensor, a pressure sensor or a temperature sensor.
[0147] The communication component 816 is configured to facilitate wired or wireless communication
between the device 800 and other devices. The device 800 may be accessed into a wireless
network based on a communication standard, such as Wireless Fidelity (WiFi), the second
Generation (2G) or the third Generation (3G), or a combination thereof. In an exemplary
embodiment, the communication component 816 receives a broadcast signal from an external
broadcast management system or broadcast related information through a broadcast channel.
In an exemplary embodiment, the communication component 816 further includes a Near
Field Communication (NFC) module so as to promote short distance communication. For
example, the NFC module may be implemented based on a Radio-frequency Identification
(RFID) technology, an Infrared Data Association (IrDA) technology, an Ultra Wide Band
(UWB) technology, a Bluetooth (BT) technology and other technologies.
[0148] In an exemplary embodiment, the device 800 may be implemented with one or more Application
Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal
Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable
Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors, or other electronic
components, and configured to execute the SMS reading methods above.
[0149] In exemplary embodiments, there is also provided a non-transitory computer readable
storage medium including instructions, such as included in the memory 804, executable
by the processor 820 in the device 800, for performing the above-described methods.
For example, the non-temporary computer readable storage medium may be a ROM, a Random-Access
Memory (RAM), a Compact Disc-ROM (CD-ROM), a magnetic tape, a floppy disk, an optical
data memory and so on. Other embodiments of the invention will be apparent to those
skilled in the art from consideration of the specification and practice of the invention
disclosed here. This application is intended to cover any variations, uses, or adaptations
of the invention following the general principles thereof and including such departures
from the present disclosure as come within known or customary practice in the art.
It is intended that the specification and examples be considered as exemplary only,
with a true scope of the invention being indicated by the following claims.
[0150] It will be appreciated that the present invention is not limited to the exact construction
that has been described above and illustrated in the accompanying drawings, and that
various modifications and changes can be made without departing from the scope thereof.
It is intended that the scope of the invention only be limited by the appended claims.
INDUSTRY APPLICABILITY
[0151] In the embodiments of the present disclosure, whether a received SMS is an SMS carrying
sensitive information is identified; when the SMS is an SMS carrying sensitive information,
an access authority list corresponding to the SMS is acquired, wherein an application
in the access authority list has an authority to access the SMS; a reading request
to read the SMS is received from a third party application, whether the third party
application belongs to the access authority list is detected, and when the third party
application belongs to the access authority list, the SMS is fed back to the third
party application, thus solving the problem that a malicious application can read
a verification code in an SMS to acquire an authority to execute a sensitive operation
due to the reason that a third party application only having an SMS reading authority
at the operating system level may read the content of an SMS in an SMS component;
for an SMS carrying sensitive information, only a third party application having an
authority to access the SMS can read the content in the SMS, thus avoiding leakage
of the sensitive information in the SMS while implementing authority control over
a single SMS.
1. Verfahren zum Lesen eines Short Message Services, SMS,
dadurch gekennzeichnet, dass das Verfahren Folgendes umfasst:
Empfangen einer Leseanforderung, um eine SMS (201) zu lesen von einer Drittanbieter-Anwendung;
Erfassen, wenn die SMS eine SMS ist, die sensible Information trägt, ob die Drittanbieter-Anwendung
zu einer Zugriffsberechtigungsliste gehört, die der SMS entspricht, die sensible Information
trägt, wobei eine Anwendung in der Zugriffsberechtigungsliste eine Berechtigung hat,
auf die SMS zuzugreifen, die sensible Information (202) trägt; und wenn die Drittanbieter-Anwendung
zu der Zugriffsberechtigungsliste gehört, Rückkoppeln der SMS, die sensible Information
trägt, zu der Drittanbieter-Anwendung (203).
2. Verfaren nach Anspruch 1, wobei der Schritt des Empfangens einer Leseanforderung von
der Drittanbieter-Anwendung, um ein SMS zu lesen, Folgendes umfasst:
Empfangen der Leseanforderung, die SMS zu lesen, von der Driranbieter-Anwendung durch
ein Betriebssystem;
Erfassen, ob die Drittanbieter-Anwendung eine SMS-Leseberechtigung hat durch das Betriebssystem;
wenn die Drittanbieter-Anwendung die SMS-Leseberechtigung hat, Weiterleiten der Leseanforderung
und eines Identifikaters der Drittanbieter-Anwendung zu einer SMS-Komponente durch
das Betriebssystem; und
Empfangen der Leseanforderung und des Identifiators der Driranbieter-Anwendung, die
von dem Betriebssystem weitergeleitet werden, durch die SMS-Komponente.
3. Verfahren nach Anspruch 2, wobei der Schritt des Erfassens, ob die Drittanbieter-Anwendung
zu einer Zugriffsberechtigungsliste gehört, die der SMS entspricht, wenn die SMS eine
SMS ist, die sensible Information trägt, Folgendes umfasst:
Erfassen, ob die SMS, die gemäß der Leseanforderung gelesen werden soll, eine SMS
ist, die sensibe Information trägt, durch die SMS-Komponente; und
wenn die SMS, die gemäß der Leseanforderung gelesen werden soll, eine SMS ist, die
sensible Information trägt, Erfassen gemäß des Identifikators, ob die Drittanbieter-Anwendung
zu der Zugriffsberechtigungsliste gehört.
4. Verfahren nach einem der Ansprüche 1 bis 3, das ferner Folgendes umfasst:
Identifizieren, ob die empfangene SMS eine SMS ist, die sensible Information trägt;
und wenn die SMS eine SMS ist, die sensible Information trägt, Akquirieren der Zugriffsberechtigungsliste,
die der SMS entspricht.
5. Verfahren nach Anspruch 4, wobei der Schritt des Akquirierens der Zugriffsberechtigungsliste,
die der SMS entspricht, wenn die SMS eine SMS ist, die sensible Information trägt,
Folgendes umfasst:
Identifizieren einer Quellpartei der SMS gemäß einer charakteristischen Information
der SMS, wobei die charakteristische Information zumindest eines von einer Sendernummer,
einem SMS-Inhalt und einem SMS-Template umfasst; und
Akquirieren einer Zugriffsberechtigungsliste, die der Quellpartei entspricht, wobei
die Zugriffsberechtigungsliste eine Anwendung umfasst, der von der Quellpartei vertraut
wird.
6. Verfahren gemäß Anspruch 4, wobei der Schritt des Identifizierens, ob die empfangene
SMS eine SMS ist, die sensible Information trägt, Folgendes umfasst:
Identifizieren, ob die SMS eine SMS ist, die sensible Information trägt, gemäß einer
charakteristischen Information der SMS, wobei die charakteristische Information zumindest
eins von einer Sendernummer, einem SMS-Inhalt und einem SMS-Template aufweist.
7. Vorrichtung zum Lesen eines Short Message Service, SMS,
dadurch gekennzeichnet, dass die Vorrichtung Folgendes aufweist:
ein Anforderungs-Empfangs-Modul (620), das konfiguriert ist, um von einer Drittanbieter-Anwendung
eine Leseanforderung zu empfangen, um eine SMS zu lesen;
ein Zugriffs-Erfassungs-Modul (640), das konfiguriert ist, wenn die SMS eine SMS ist,
die sensible Information trägt, zu erfassen, ob die Drittanbieter-Anwendung zu einer
Zugriffsberechtigungsliste gehört, die der SMS entspricht, die sensible Infomration
trägt, wobei eine Anwendung in der Zugriffsberechtigungsliste eine Berechtigung hat,
auf die SMS zuzugreifen, die sensible Information trägt; und
ein Informations-Rückkopplungs-Modul (660), das konfiguriert ist, wenn die Drittanbieter-Anwendung
zu der Zugriffsberechtigungsliste gehört, die SMS an die Drittanbieter-Anwendung rückzukoppeln,
die sensible Information trägt.
8. Vorrichtung nach Anspruch 7, wobei das Anforderungs-Empfangs-Modul folgendes aufweist:
ein Lese-Empfangs-Unter-Modul (731), das konfiguriert ist, um die Leseanforderung
zu empfangen, um die SMS von der Drittanbieter-Anwendung durch ein Betriebssystem
zu lesen;
eine erstes Berechtigungs-Unter-Modul (732), das konfiguriert ist ,um durch das Betriebssystem
zu erfassen, ob die Drittanbieter-Anwendung eine SMS-Leseberechtigung hat;
ein Anforderungs-Weiterleitungs-Unter-Modul (733), das konfiguriert ist, um, wenn
die Drittanbieter-Anwendung die SMS-Leseberechtigung hat, die Leseanforderung und
einen Identifikator der Drittanbieter-Anwendung an eine SMS-Komponente durch das Betriebssystem
weiterzuleten; und
ein Identifikator-Empfangs-Unter-Modul (734), das konfiguriert ist, um durch die SMS-Komponente
die Leseanforderung und den Identifikator der Drittanbieter-Anwendung zu empfangen,
die durch das Betriebssystem weitergeleitet werden.
9. Vorrichtung nach Anspruch 7, wobei das Zugriffs-Erfassungs-Modul Folgendes aufweist:
ein Informations-Erfassungs-Unter-Modul (741), das konfiguriert ist, um durch die
SMS-Komponente zu erfassen, ob die SMS, die gemäß der Leseanforderung gelesen werden
soll, eine SMS ist, die sensible Information trägt; und
ein zweites Berechtigungs-Unter-Modul (742), das konfiguriert ist, um, wenn die SMS,
die gemäß der Leseanforderung gelesen werden soll, eine SMS ist, die sensible Information
trägt, zu erfassen, ob die Drittanbieter-Anwendung zu der Zugriffsberechtigungsliste
gemäß dem Identifikator gehört.
10. Vorrichtung nach einem der Ansprüche 7 bis 8, die ferner Folgendes aufweist:
ein SMS-Identifizierungs-Modul (710); das konfiguriert ist, um zu identifizieren,
ob die empfangene SMS eine SMS ist, die sensible Information trägt; und
ein Berechtigungs-Akquirierungs-Modul (720), das konfiguriert ist, um wenn die SMS
eine SMS ist, die sensible Information trägt, die Zugriffsberechtigungsliste zu akquirieren,
die der SMS entspricht.
11. Vorrichtung nach Anspruch 9, wobei das Berechtigungs-Modul Folgendes aufweist:
ein Quellpartei-Identifizierungs-Unter-Modul (721), das konfiguriert ist, um eine
Quellpartei der SMS gemäß einer charakteristischen Information der SMS zu identifizieren,
wobei die charakteristische Information zumindest eins von einer Sendernummer, einem
SMS-Inhalt und einem SMS-Template umfasst; und
ein Listen-Akquirierungs-Unter-modul (722); das konfiguriert ist, um eine Zugriffsberechtigungsliste
zu akquirieren, die der Quellpartei entspricht, wobei die Zugriffsberechtigungsliste
eine Anwendung aufweist, der von der Quellpartei vertraut wird.
12. Vorrichtung nach Anspruch 9, wobei
das SMS-Identifizierungs-Modul ferner konfiguriert ist, um gemäß einer charakteristischen
Information der SMS zu identifizieren, ob die SMS eine SMS ist, die sensible Information
trägt, wobei die charakteristische Information zumindest eins von einer Sendernummer,
einem SMS-Inhalt und einem SMS-Template aufweist.
13. Vorrichtung zum Lesen eines Short Message Service, SMS, dadurch gekennzeichenet, dass
die Vorrichtung Folgendes aufweist:
einen Prozessor; und
einen Speicher, der konfiguriert ist, um eine Instruktion zu speichern, die von dem
Prozessor ausführbar ist, wobei der Prozessor konfiguriert ist, das Verfahren nach
einem der Ansprüche 1 bis 6 durchzuführen.
14. Computer-Programm, das Instruktionen zum Ausführen der Schritte eines Verfahrens zum
Lesen eines Short Message Services, SMS, gemäß einem der Ansprüche 1 bis 6 umfasst,
wenn das Programm von einem Computer ausgeführt wird.
15. Aufnahmemedium, das von einem Computer lesbar ist und darauf ein Computerprogramm
aufgenommen hat, das Instruktionen zum Ausführen der Schritte eines Verfahrens zum
Lesen eines Short Message Service, SMS, gemäß einem der Ansprüche 1 bis 6 aufweist.
1. Procédé pour lire un service de minimessages, SMS,
caractérisé en ce que le procédé comporte les étapes consistant à :
recevoir, en provenance d'une application tierce, une requête de lecture pour lire
un SMS (201) ;
détecter, lorsque le SMS est un SMS porteur d'informations sensibles, si l'application
tierce appartient à une liste d'autorisations d'accès correspondant au SMS porteur
d'informations sensibles, dans lequel une application dans la liste d'autorisations
d'accès possède une autorisation d'accéder au SMS porteur d'informations sensibles
(202) ; et
lorsque l'application tierce appartient à la liste d'autorisations d'accès, retransférer
le SMS porteur d'informations sensibles vers l'application tierce (203).
2. Procédé selon la revendication 1, dans lequel l'étape consistant à recevoir, en provenance
d'une application tierce, une requête de lecture pour lire un SMS comporte les étapes
consistant à :
recevoir la requête de lecture pour lire le SMS provenant de l'application tierce
via un système d'exploitation ;
détecter, via le système d'exploitation, si l'application tierce possède une autorisation
de lecture de SMS ;
lorsque l'application tierce possède l'autorisation de lecture de SMS, transférer
la requête de lecture et un identifiant de l'application tierce vers un composant
de SMS via le système d'exploitation ; et
recevoir, via le composant de SMS, la requête de lecture et l'identifiant de l'application
tierce qui sont transférés par le système d'exploitation.
3. Procédé selon la revendication 2, dans lequel l'étape consistant à détecter, lorsque
le SMS est un SMS porteur d'informations sensibles, si l'application tierce appartient
à une liste d'autorisations d'accès correspondant au SMS, comporte les étapes consistant
à :
détecter, via le composant de SMS, si le SMS à lire d'après la requête de lecture
est un SMS porteur d'informations sensibles ; et
lorsque le SMS à lire d'après la requête de lecture est un SMS porteur d'informations
sensibles, détecter, d'après l'identifiant, si l'application tierce appartient à la
liste d'autorisations d'accès.
4. Procédé selon l'une quelconque des revendications 1 à 3, comportant en outre les étapes
consistant à :
identifier si le SMS reçu est un SMS porteur d'informations sensibles ; et
lorsque le SMS est un SMS porteur d'informations sensibles, acquérir la liste d'autorisations
d'accès correspondant au SMS.
5. Procédé selon la revendication 4, dans lequel l'étape consistant à, lorsque le SMS
est un SMS porteur d'informations sensibles, acquérir la liste d'autorisations d'accès
correspondant au SMS, comporte les étapes consistant à :
identifier une partie source du SMS d'après des informations caractéristiques du SMS,
dans lequel les informations caractéristiques comportent au moins un élément parmi
un numéro d'émetteur, un contenu de SMS et un modèle de SMS ; et
acquérir une liste d'autorisations d'accès correspondant à la partie source, dans
lequel la liste d'autorisations d'accès comporte une application approuvée par la
partie source.
6. Procédé selon la revendication 4, dans lequel l'étape consistant à identifier si le
SMS reçu est un SMS porteur d'informations sensibles comporte l'étape consistant à
:
identifier, d'après des informations caractéristiques du SMS, si le SMS est un SMS
porteur d'informations sensibles, dans lequel les informations caractéristiques comportent
au moins un élément parmi un numéro d'émetteur, un contenu de SMS et un modèle de
SMS.
7. Dispositif pour lire un service de minimessages, SMS,
caractérisé en ce que le dispositif comporte :
un module de réception de requête (620), configuré pour recevoir, en provenance d'une
application tierce, une requête de lecture pour lire un SMS ;
un module de détection d'accès (640) configuré pour détecter, lorsque le SMS est un
SMS porteur d'informations sensibles, si l'application tierce appartient à une liste
d'autorisations d'accès correspondant au SMS porteur d'informations sensibles,
dans lequel une application dans la liste d'autorisations d'accès possède une autorisation
d'accéder au SMS porteur d'informations sensibles ; et
un module de retransfert d'informations (660) configuré pour, lorsque l'application
tierce appartient à la liste d'autorisations d'accès, retransférer le SMS porteur
d'informations sensibles vers l'application tierce.
8. Dispositif selon la revendication 7, dans lequel le module de réception de requête
comporte :
un sous-module de réception de lecture (731), configuré pour recevoir la requête de
lecture pour lire le SMS en provenance de l'application tierce via un système d'exploitation
;
un premier sous-module d'autorisation (732) configuré pour détecter, via le système
d'exploitation, si l'application tierce possède une autorisation de lecture de SMS
;
un sous-module de transfert de requête (733) configuré pour transférer, lorsque l'application
tierce possède l'autorisation de lecture de SMS, la requête de lecture et un identifiant
de l'application tierce vers un composant de SMS via le système d'exploitation ; et
un sous-module de réception d'identifiant (734) configuré pour recevoir, via le composant
de SMS, la requête de lecture et l'identifiant de l'application tierce qui sont transférés
par le système d'exploitation.
9. Dispositif selon la revendication 7, dans lequel le module de détection d'accès comporte
:
un sous-module de détection d'informations (741) configuré pour détecter, via le composant
de SMS, si le SMS à lire d'après la requête de lecture est un SMS porteur d'informations
sensibles ; et
un second sous-module d'autorisation (742) configuré pour, lorsque le SMS à lire d'après
la requête de lecture est un SMS porteur d'informations sensibles, détecter si l'application
tierce appartient à une liste d'autorisations d'accès d'après l'identifiant.
10. Dispositif selon l'une quelconque des revendications 7 et 8, comportant en outre :
un module d'identification de SMS (710), configuré pour identifier si le SMS reçu
est un SMS porteur d'informations sensibles ; et
un module d'acquisition d'autorisation (720) configuré pour acquérir, lorsque le SMS
est un SMS porteur d'informations sensibles, la liste d'autorisations d'accès correspondant
au SMS.
11. Dispositif selon la revendication 9, dans lequel le module d'acquisition d'autorisation
comporte :
un sous-module d'identification de partie source (721), configuré pour identifier
une partie source du SMS d'après des informations caractéristiques du SMS, dans lequel
les informations caractéristiques comportent au moins un élément parmi un numéro d'émetteur,
un contenu de SMS et un modèle de SMS ; et
un sous-module d'acquisition de liste (722), configuré pour acquérir une liste d'autorisations
d'accès correspondant à la partie source, dans lequel la liste d'autorisations d'accès
comporte une application approuvée par la partie source.
12. Dispositif selon la revendication 9, dans lequel le module d'identification de SMS
est en outre configuré pour identifier, d'après des informations caractéristiques
du SMS, si le SMS est un SMS porteur d'informations sensibles, dans lequel les informations
caractéristiques comportent au moins un élément parmi un numéro d'émetteur, un contenu
de SMS et un modèle de SMS.
13. Dispositif pour lire un service de minimessages, SMS,
caractérisé en ce que le dispositif comporte :
un processeur ; et
une mémoire configurée pour stocker une instruction exécutable par le processeur,
dans lequel le processeur est configuré pour mettre en oeuvre le procédé selon l'une
quelconque des revendications 1 à 6.
14. Programme informatique incluant des instructions pour exécuter les étapes d'un procédé
de lecture d'un service de minimessages, SMS, selon l'une quelconque des revendications
1 à 6 lorsque ledit programme est exécuté par un ordinateur.
15. Support d'enregistrement lisible par un ordinateur et ayant enregistré celui-ci un
programme informatique incluant des instructions pour exécuter les étapes d'un procédé
de lecture d'un service de minimessages, SMS, selon l'une quelconque des revendications
1 à 6.